Attacks on quantum key distribution protocols that employ non-ITS authentication
نویسندگان
چکیده
منابع مشابه
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with large computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a se...
متن کاملRestricted attacks on semi-quantum key distribution protocols
In this paper, we investigate single state, semi-quantum key distribution protocols. These are protocols whereby one party is limited to measuring only in the computational basis, while the other, though capable of measuring in both computational and Hadamard bases, is limited to preparing and sending only a single, publicly known qubit state. Such protocols rely necessarily on a two-way quantu...
متن کاملQuantum key distribution with authentication
The security of the previous quantum key distribution (QKD) protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In fact, the previous QKD protocols is un secure without authentication in practical communication. In this paper, we proposed an improv...
متن کاملInter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols
We present a new attack, called the inter-protocol interleaving attack, on authentication and key distribution protocols. The attack enlightens us two things. The first is that when considering attacks against a protocol, we should consider not only the protocol itself, but also the interaction with other protocols. The second is about a warning of “not using the shared secret keys between a se...
متن کاملQuantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information Processing
سال: 2015
ISSN: 1570-0755,1573-1332
DOI: 10.1007/s11128-015-1160-4